Research Article

An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems

Table 1

Comparisons of properties.

Chen et al.’s [15] Chiou et al.’s [16] Cheng et al.’s [20] Ours

Resistance of impersonation attack Yes Yes Yes Yes
Prevention of replay attack Yes Yes Yes Yes
Preserving patient privacy No Yes No Yes
Complete mutual authentication No No No Yes
Perfect forward secrecy Yes Yes Yes Yes
Confidentiality Yes Yes No Yes
Perfect backward secrecy Yes Yes Yes Yes